Electromagnetic Side-Channel Attacks and Potential Countermeasures
Offered By: CAE in Cybersecurity Community via YouTube
Course Description
Overview
Explore electromagnetic side-channel attacks and potential countermeasures in this 28-minute lecture by Tristen Mullins from the University of South Alabama. Delve into cryptographic algorithms, power versus electromagnetic side-channels, and localized electromagnetic analysis. Learn about differential EM analysis, trace collection techniques, and the importance of probe placement and pre-processing. Discover methods for aligning traces, including static alignment, and examine various side-channel countermeasures. Gain insights into EMA countermeasures, spatial randomization for localized EM, and moving target defense strategies. Conclude with an overview of ongoing work in this critical area of cybersecurity.
Syllabus
Intro
Cryptographic Algorithms
Power vs EM Side-Channels
Localized EMA
Electromagnetic SCA Attacks
Differential EM Analysis
Trace Collection: Localized EM
Trace Collection: Probe Placement
Trace Collection: Pre-Processing
Aligning Traces
Static Alignment
Side-Channel Countermeasures
EMA Countermeasures
Localized EM: Spatial Randomization
Moving Target Defense
Ongoing Work
Taught by
CAE in Cybersecurity Community
Related Courses
Cryptography And Network SecurityIndian Institute of Technology, Kharagpur via Swayam Applied Cryptography
University of Colorado System via Coursera Cryptography Principles for IT Professionals and Developers
Pluralsight Cryptography Application
Pluralsight Security Architecture and Engineering: Build Defenses for CISSP®
Pluralsight